Analysis
-
max time kernel
1200s -
max time network
1170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 14:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://evriusa.com
Resource
win10v2004-20240704-en
General
-
Target
http://evriusa.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe 4516 chrome.exe 4516 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1756 2516 chrome.exe 82 PID 2516 wrote to memory of 1756 2516 chrome.exe 82 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2640 2516 chrome.exe 85 PID 2516 wrote to memory of 2344 2516 chrome.exe 86 PID 2516 wrote to memory of 2344 2516 chrome.exe 86 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87 PID 2516 wrote to memory of 1672 2516 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://evriusa.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdeb45ab58,0x7ffdeb45ab68,0x7ffdeb45ab782⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1980,i,10360949892397917324,763381896486594131,131072 /prefetch:22⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1980,i,10360949892397917324,763381896486594131,131072 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2264 --field-trial-handle=1980,i,10360949892397917324,763381896486594131,131072 /prefetch:82⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1980,i,10360949892397917324,763381896486594131,131072 /prefetch:12⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1980,i,10360949892397917324,763381896486594131,131072 /prefetch:12⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3668 --field-trial-handle=1980,i,10360949892397917324,763381896486594131,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1980,i,10360949892397917324,763381896486594131,131072 /prefetch:82⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 --field-trial-handle=1980,i,10360949892397917324,763381896486594131,131072 /prefetch:82⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2496 --field-trial-handle=1980,i,10360949892397917324,763381896486594131,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58dd02cb1750c163b7f8804c2e11fbdd6
SHA13c1519466eab99d02742ca1671e5ddb3b55e3972
SHA256f9e8a3598c89849fe55ba5aa93c19315550e690f92517816902383e9e3728442
SHA51229a1528f52efc72fe611f3fa7f0aa5d4ba2b6ca343b46efe644425656a593914d7e328413fa747556a8079a06d82f114d4f93f339a1aa4ad8580a32d06234e02
-
Filesize
1KB
MD5f4a331ca7c7240906f2bad0c6fb1f218
SHA15696f8064a2bcb1a4e20b5f61be23dc90b3c0c61
SHA2568a72f6ecd3e3544b94cdc77197a563135ca9135b18813e2acfca2b5af9ef89e7
SHA5128a9cb41342460dc0b68ce7a6ae5ef64342cbd97100749c685e4f077088cdf2da026decf5257e86aa8b612921bd865efe533ce75727c2020fd26a21fc46c7a3ed
-
Filesize
1KB
MD5462161e010e0647a75bc2c7d1034d4e5
SHA109aab0fa48d252b10c9d1634346ab2a8ed30cbbc
SHA2565ea60ab296a3750cb04c68884fb51f4a9e7f0ffb8b49d0ac0315d89d0d8a9d19
SHA5127ddce933729276d81f6d2e16963539a159f376de651a5ac090d979e71585c8bdd50ff638ff29bdd7ac19f6070a0e4a70a58f2cfb2551c84c6992bafea91bec05
-
Filesize
2KB
MD5597e80e0c994a0f2d605616a34364b1b
SHA16873f7ad7b63024c99b51b8f6d720aa681d40e42
SHA25613412d7601516a0e86cefa4527e0e2097134c2b6fb970ac85fe20950eb180a28
SHA51247b3d227e7071e95c436b787b3c22718dd65b050488f1fbe63623b0055908bfc321ac41815b902676bcd261d0092ec231dbad8a6cb67bde325417e1b6b8bb44f
-
Filesize
2KB
MD5fc7f06417fd419ab342c1357ad2a98ae
SHA11e3392dbacf661e8686a415329d19cc092842b4c
SHA25653b017b544cd30139175beb5a32f98a6ded5bb0f0aa5ed935a42daaa4cb0d49a
SHA512b4dbb2a4becf9585ba0d1d728a2f7afad15011223508378dbee43a3b29e8938c0f7eff7a962932481366aaebdadb9834ac03bb2deff5a4109cce079dd5eed314
-
Filesize
2KB
MD509fefac55875798635e2cfa8ab027369
SHA1ad1b35c297119466fe116681cde7343a39081cae
SHA2560b8e782f0d2553c9a5731be77a172cbc0ad1544f9c6e8a69622aed2a9199a342
SHA5129ca1b01cebbbf305fd8f6152994ceb713a05c507fd6d61fb7f05cb99dc408c704b5670c7f34fdb30e337fa30e1243968a1df0300b4511512dd0bc1424d1960b8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD58cb1e2d2963bd87ee40639bdfcafdf16
SHA1ddc1e9b832d7c13550e3693dffb3add7fc70fde2
SHA25610eeb6425ed1dd5a594285f9a2979c6de695effc5efaed0be90cf11b7479f7ce
SHA5123e6945e14bbe2ed72eaaff11a2c9bca060e255672b4cb2f9975e97c6fc35b2f31a2a73ebbf7b99d25acd286a8125f813d9ca26a3c9fcf41c20c2cc85535efae7
-
Filesize
857B
MD56465a4534db7c27c887c9f792bc76c78
SHA13a3180f1cb55e15e2f050c49a5dd802bfa95edb1
SHA256650093f12e63d9b774697b6ffeff7463254bd425bfdc675fa7d205083154bc0a
SHA51260ddbb420baa4d5c9616a990d47cc00158bd1e1a935e504aee059074234c8123190927740fa417f51d6738b4b320fcb228e85017759adc3932a6508cfa1b1d1e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\e259122e-34c9-40ce-ae16-f099f104e0b0.tmp
Filesize857B
MD54bf2e578342829b5d8d76f6e6d717e09
SHA186eafe27bdfd0164fce195d598a151e93006cf9b
SHA256ff783a877edc1f19febf5664b68e37f2b98ee84c87e707ce879282ac87a3097d
SHA512d85ef941b94c16e97de27872ff4d8a7bcbdbacdc2a1a5feb89d91956b65f83600f3acf25625980e26c055c3b6f1101d61a65f4a8149333ba82cd5f84ad3ed902
-
Filesize
6KB
MD554a292e299ec0f8bc4e782b6e006da1b
SHA141cb72d62f9a9a2108ec60fa03190db146b2a176
SHA25691a251926506eb9a52866b4eff994f328f4bb6161c2cc0f1ad9e8bc723d79acd
SHA512cc63adf19aa288cf3b4479196c158220cb0d69425e75febb27dde3104b31e8318bda48330841e798b1b685aaf9002ec2b427a94a2efe50c522b40b62555ca06a
-
Filesize
144KB
MD5f18d944842668b05150118b9d6c55f4e
SHA1fd148d3e721d88f1ef18a747069bd36fa99b0a3d
SHA256f931a960465a6667666c3bc8f1e6191f1212d520e8956f38781a449cb30e214e
SHA512a465bfdd0c48350ef442ba2e3959ea0b69f795a6cdeaa202e59841ccff11ca7418032158cb5ab6010eff8382ece8fe16bdf3219142d14c517a9a33080c5bf8ae